Microcontrollers are the heart of numerous connected systems. Although they store sensitive data, the security of the underlying hardware is scarcely considered during product development – leaving them vulnerable to hacker attacks.
Microcontrollers as gateways for hackers: Hardware security is still too little considered during development.
Simple measures are already sufficient to prevent cyberattacks. This is shown by the study on hardware attacks on microcontrollers by the Fraunhofer Institute for Applied and Integrated Security AISEC, commissioned by the Federal Office for Information Security (BSI).
Microcontrollers are indispensable for the Internet of Things (IoT). These small single-chip computer systems are used in nearly all smart devices – from industrial and consumer products to sensitive applications such as access control systems, e-Wallets, and critical infrastructures in aviation or medicine. Microcontrollers store sensitive data such as cryptographic keys, access data, and valuable intellectual property. However, due to cost reasons and a lack of awareness of the dangers, standard microcontrollers are often used in security-relevant IoT products, making them an attractive target for attackers who also exploit vulnerabilities in the hardware.
Protection measures for relevant attack techniques tested
The study "Hardware Attacks against Microcontrollers", conducted by Fraunhofer AISEC on behalf of the BSI, shows that hardware protection receives too little consideration in product development. Many smart devices, whose core are microcontrollers, have security vulnerabilities. However, even in IoT devices that are already in circulation, protection measures can easily be implemented via software to prevent most relevant hardware attacks or significantly increase the effort required by an attacker. To raise awareness of the dangers in development and manufacturing, the researchers at Fraunhofer AISEC have evaluated three types of hardware attacks on microcontrollers and proposed appropriate countermeasures:
Hardware attacks and countermeasures
1) Control-Flow Attacks (control flow manipulation): In this attack technique, the proper execution of a program is manipulated through voltage and clock glitching, electromagnetic, or laser-based error injection. Attacks of this kind can be prevented or at least made more cumbersome through compiler-based countermeasures based on existing error detection systems. Software tools of this kind are currently a subject of research in hardware security. Initial versions of the tools are already being used in the industry.
2) Side-Channel Attacks: Insights into the energy consumption and electromagnetic emission of the chip allow attackers unauthorized knowledge about keys in the microcontroller. To prevent these sensitive pieces of information from being spied on, so-called leakage-resilient cryptographic methods, or the masking of secret values, or shuffling of the processing sequence can act as protective measures. This obscures correlations between measured values and sensitive information.
3) Attacks on Read-Out Protection Techniques: Vulnerabilities in the debug interface can be exploited to access confidential data on the microcontroller. While bypassing the read-out protection mechanism cannot be entirely prevented through software-based methods alone, the impact of an attack can be significantly reduced depending on the product, for example by using code obfuscation techniques or by encrypting sensitive data stored in the flash memory area.
The three examined attack techniques endanger the integrity, confidentiality, and reliability of almost all microcontrollers identified in a market analysis and the information stored on them. The countermeasures proposed and practically demonstrated in the study can be software-based and often implemented retrospectively, without significantly impairing the performance or function of the controller.
Appeal to industry, research, and policy
However, these protective measures are not yet widely applied. The researchers therefore urge microcontroller manufacturers to include hardware attacks in their threat models and to disclose these models. This information would enable IoT product manufacturers, who integrate their microcontrollers, to select appropriate products for security-relevant applications.
They call on the research community to improve the tools for software-based countermeasures in terms of practicability and user-friendliness for embedded developers. They urge legislators and regulators to create economic incentives so that protective measures against hardware attacks become essential for certain applications. Ultimately, consumers can also have a significant impact on the progress in developing better-protected hardware through their purchasing behavior.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
The research team of the "Hardware Security" department at Fraunhofer AISEC emphasizes: "Our study shows that hardware attacks on microcontrollers represent a real threat to security-relevant IoT systems. We want to encourage always considering the security of microcontrollers during their development and implementing effective countermeasures." (mk)